If the time is not correct, verify that systemd-timesyncd is active:
If the service is not running, enable and start it:
Then, force a time synchronization:
This will ensure the system clock is updated automatically.
Once the time is correct, proceed with the installation script.
Run the installer with elevated privileges:
🔑 3. Offline Code Setup
During installation, you'll be prompted to generate and verify an Offline Code:
A QR code and a secret key (Base32) will be shown.
Enter the corresponding Offline Code to verify.
This code will be used if the device is offline.
Example:
🌐 4. Enter Admin URL and API Key
When prompted:
Enter your Mirket admin URL (default is: https://admin.mirketsecurity.com)
Paste the API Key generated from the Mirket Admin Portal.
🙋♂️ 5. Configure Bypass Users (Optional)
During setup, you can define users who can bypass MFA (e.g., for emergency or monitoring accounts).
Example input:
🔐 6. Authentication Test
SSH Login
1 triggers a Mirket Push notification to your mobile device.
You can also enter a passcode manually.
Sudo/Privilege Elevation
Supported Passcode Types:
Mirket token
TOTP (Time-based One-Time Password)
Offline code
Recovery code
🧹 7. Uninstalling the Agent
To remove the Mirket OS Agent completely:
This will:
Remove all related binaries
Clean PAM configurations
Restore SSH settings
🚀 Enabling Passwordless MFA with Mirket PAM Module
This guide explains how to configure SSH login and privileged commands (sudo) to enforce passwordless Multi-Factor Authentication (MFA) using the pam_mirket_authenticator.so module. By adjusting the PAM configuration only—without modifying the sshd_config file—you achieve a secure and streamlined authentication flow.
🎯 Objective
To enforce Mirket MFA as the sole authentication method for:
SSH login
sudo and other PAM-based elevated actions
while fully disabling traditional password or public key authentication.
Open the common-auth PAM configuration file:
Comment out the default authentication modules by placing # at the beginning of the following lines:
Then add or ensure the Mirket MFA module is the only active authentication rule:
📌 This ensures that PAM no longer checks the system password, and only relies on Mirket’s authenticator.
sudo timedatectl set-ntp true
sudo timedatectl status
sudo ./debian_install_mirket.sh
pgsqlKopyalaDüzenlePlease enter a username to add as a bypass user (type -1 to finish): mirket
Please enter a username to add as a bypass user (type -1 to finish): -1
login as: oliver
Keyboard-interactive authentication prompts from server:
| Password:
| Enter Passcode Or 1 For Push: 1
End of keyboard-interactive prompts from server
$ sudo su
[sudo] password for oliver:
Enter Passcode Or 1 For Push: 453452